We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Article:Network Layer Attacks and Defense Mechanisms in MANETS- A Survey

by G.S. Mamatha, Dr. S.C. Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 9
Year of Publication: 2010
Authors: G.S. Mamatha, Dr. S.C. Sharma
10.5120/1415-1911

G.S. Mamatha, Dr. S.C. Sharma . Article:Network Layer Attacks and Defense Mechanisms in MANETS- A Survey. International Journal of Computer Applications. 9, 9 ( November 2010), 12-17. DOI=10.5120/1415-1911

@article{ 10.5120/1415-1911,
author = { G.S. Mamatha, Dr. S.C. Sharma },
title = { Article:Network Layer Attacks and Defense Mechanisms in MANETS- A Survey },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 9 },
number = { 9 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume9/number9/1415-1911/ },
doi = { 10.5120/1415-1911 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:08.105314+05:30
%A G.S. Mamatha
%A Dr. S.C. Sharma
%T Article:Network Layer Attacks and Defense Mechanisms in MANETS- A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 9
%N 9
%P 12-17
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The foremost concerned security issue in mobile ad hoc networks is to protect the network layer from malicious attacks, thereby identifying and preventing malicious nodes. A unified security solution is in very much need for such networks to protect both route and data forwarding operations in the network layer. Without any appropriate security solution, the malicious nodes in the network can readily act to function as routers. This will solely disturb the network operation from correct delivering of the packets, like the malicious nodes can give stale routing updates or drop all the packets passing through them. In this paper a study that will through light on such attacks in MANETS is presented. The paper also focuses on different security aspects of network layer and discusses the effect of the attacks in detail through a survey of approaches used for security purpose.

References
  1. Y. Xiao, X. Shen, and D.-Z. Du (Eds.), “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, WIRELESS/MOBILE NETWORK SECURITY, pp. – - –, © 2006 Springer
  2. C. Perkins, Ad Hoc Networks, Addison-Wesley, 2001.
  3. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, pp. 38-47, 2004.
  4. M. Zapata, Secure Ad Hoc On-Demand Distance Vector (SAODV). Internet draft, draft-guerrero-manet-saodv-01.txt, 2002.
  5. Y. Hu, A. Perrig, and D. Johnson, Ariadne: A Secure On-Demand Routing for Ad Hoc Networks. Proc. of MobiCom 2002, Atlanta, 2002.
  6. Y. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy, pp. 28-39, 2004.
  7. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of theACM Workshop on Wireless Security, pp. 21-30, 2002.
  8. Y. Hu, A Perrig, and D. Johnson, Packet Leashes: A Defense Against Wormhole Attacks inWireless Ad Hoc Networks. Proc. of IEEE INFORCOM, 2002.
  9. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002 .
  10. S. Yi and R. Kravets, Composite Key Management for Ad Hoc Networks.Proc. of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services(MobiQuitous’04), pp. 52-61, 2004.
  11. R. Oppliger, Internet and Intranet Security, Artech House, 1998.
  12. C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks, Architectures and Protocols”, Low Price Edition, Pearson Education, 2007, pp. 521.
  13. Dokurer, Semih.”Simulation of Black hole attack in wireless Ad-hoc networks”. Master's thesis, AtılımUniversity, September 2006.
  14. Payal N. Raj, Prashant B. Swadas. “DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV Based MANET”, IJCSI International Journal of Computer Science Issues, 2:54-59, 2009.
  15. Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”, Journal of Internet Engineering, 2:1, 2008.
  16. Emmanouil A. Panaousis, Levon Nazaryan, Christos Politis, ” Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications”, Mobimedia’09, September 7-9, 2009, London, UK.
  17. A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.
  18. S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad Hoc Routing for Wireless Networks”, Proceedings of ACM MOBIHOC 2001, pp. 299-302, October, 2001.
  19. Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  20. Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, “A secure Routing Protocol for Ad hoc networks”, In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP’ 02), pp. 78-87, November 2002.
  21. P. Michiardi and R. Molva, “CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”, IFIP-Communication and Multimedia Security Conference 2002.
  22. S. Buchegger and J. Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks”, Proc. of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, 2002.
  23. A. Perrig, R. Canetti, J. Tygar, and D. Song, “The TESLA Broadcast Authentication Protocol”, Internet Draft, 2000.
  24. K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, “Detecting disruptive routers: a distributed network monitoring approach”, in Proc. Symposium on Security and Privacy, May 1998.
  25. H. Yang, J. Shu, X. Meng, and S. Lu, “SCAN: Self-organized network-layer security in mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, February 2006, pp. 261-273.
  26. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks”, in Proc. 6th ACM International Conference on Mobile Computing and Networking, , Boston, USA, August 2000, pp. 255-265.
  27. H. Deng, W. Li, and D. Agrawal, “Routing Security in Wireless Ad Hoc Networks”, IEEE Communications Magazine, vol. 40, no. 10, 2002.
  28. Patcha, A; Mishra, A. “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks”, In Proceedings of Radio and Wireless conference, RAWCON apos; 03, Vol. 10, Issue 13, pp. 75–78, Aug 2003.
  29. Y. Hu, A Perrig, and D. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. Proc. of IEEE INFOCOM, 2002.
  30. Khurana, S.; Gupta, N.; Aneja, N, “Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)”, 6th International Conference on Networking (ICN’07), April 2007, pp: 16.
  31. S. Capkun, L. Buttyan, and J. Hubaux, Sector: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
  32. W. Wang and B. Bhargava. Visualization of Wormholes in Sensor Networks. In Proceedings of the ACM workshop on Wireless security (Wise’04), 2004. pp. 51-60.
  33. Sun Choi, Doo-young Kim, Do-hyeon Lee and Jae-il Jung, “WAP: Wormhole Attack Prevention Algorithm In Mobile Ad Hoc Networks”, In Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 0, ISBN = 978-0-7695-3158-8, pp. 343-348, 2008.
  34. N. Song, L. Qian and X. Li, “Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach”, In proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, 2005.
  35. Ming Yu; Mengchu Zhou; Wei Su, “A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments”, IEEE Transactions on Vehicular Technology, Volume 58, Issue 1, Jan 2009,pp: 449 – 460.
  36. P. Papadimitratos and Z. Haas, Secure Data Transmission in Mobile Ad Hoc Networks. Proc. of the 2003 ACM Workshop on Wireless Security, pp. 41-50, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network network-layer attacks cryptographic security malicious nodes